{"vulnerability": "CVE-2023-28467", "sightings": [{"uuid": "26339c2f-f3c6-410a-bd58-c3e4507f8119", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28467", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3127", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27 \ud83d\udd28  -  Hackers Factory\n\n\u200b\u200bFirefox Decrypt\n\nA tool to extract passwords from Mozilla (Firefox\u2122, Waterfox\u2122, Thunderbird\u00ae, SeaMonkey\u00ae) profiles.\n\nhttps://github.com/unode/firefox_decrypt\n\n#infosec #pentesting #redteam\n\n\u200b\u200bmutation fuzzer\n\nMutate a binary to identify potential #exploit candidates.\n\nhttps://github.com/demetriusford/mutation-fuzzer\n\n#cybersecurity #infosec\n\n\u200b\u200bmasm32-kernel-programming\n\nmasm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)\n\nhttps://github.com/therealdreg/masm32-kernel-programming\n\n#malware #cybersecurity #infosec\n\n\u200b\u200bXSS-Bypass-Filters\n\nhttps://github.com/Edr4/XSS-Bypass-Filters\n\n#infosec #bugbounty \n\n\u200b\u200bCVE-2023-3519\n\nThis #Nmap NSE script checks for the CVE-2023-3519 vulnerability in Citrix Gateway and Citrix AAA.\n\nhttps://github.com/dorkerdevil/CitrixFall\n\n#infosec \n\n\u200b\u200bCVE-2023-3519\n\nThe cve_2023_3519_inspector.py is a Python-based vulnerability scanner for detecting the CVE-2023-3519 vulnerability in Citrix Gateways. It performs a passive analysis and fingerprinting of target websites to assess their vulnerability based on a series of checks.\n\nhttps://github.com/securekomodo/citrixInspector\n\n#cve\n\n\u200b\u200bCVE-2023-28121\n\nWooCommerce Payments &lt; 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]\n\nhttps://github.com/im-hanzou/Mass-CVE-2023-28121\n\n#cve\n\n\u200b\u200bCVE-2023-32681\n\nVulnerability in python-requests affects IBM InfoSphere Information Server.\n\nhttps://github.com/hardikmodha/POC-CVE-2023-32681\n\n#cve #poc #cybersecurity #infosec\n\n\u200b\u200bCloudflare Origin ip\n\nThis Python tool compares the HTTP response of the given subdomain to HTTP responses of a list of IPs addresses. This list is based on:\n\n\u2022 subdomains supplied by the user\n\u2022 subdomains found on external sources\n\u2022 IPs found external sources\n\nhttps://github.com/gwen001/cloudflare-origin-ip\n\n\u200b\u200bBucketLoot\n\nBucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for custom keywords as well as Regular Expressions from publicly-exposed storage buckets by scanning files that store data in plain-text.\n\nhttps://github.com/redhuntlabs/BucketLoot\n\n\u200b\u200bHtmlSmuggling\n\nit is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page.\n\nhttps://github.com/De3vil/HtmlSmuggling\n\n\u200b\u200bTGSThief\n\nI think a lot of people have seen the project GIUDA. It is an interesting way to get the TGS of a user whose logon session is just present on the computer. The problem is that its code is written in Pascal (the last time I wrote in Pascal was at school), so I had to rewrite the project in C++.\n\nhttps://github.com/MzHmO/TGSThief\n\n\u200b\u200bCVE-2023-28467\n\nCross-site scripting (XSS) vulnerability in the User CP module allows remote authenticated users to inject HTML via the user email field, triggered on the User CP Home page.\n\nAfter registration, the e-mail address is changed and the XSS payload is placed. Then, when \"User CP\" is entered, the vulnerability is triggered.\n\nhttps://github.com/ahmetaltuntas/CVE-2023-28467\n\n\u200b\u200bRandomTSScripts\n\nRandom collection of scripts useful for engagements, which don't really need their own repo.\n\nhttps://github.com/xpn/RandomTSScripts\n\n\u200b\u200bCVE-2023-38408 \n\nRemote Code Execution in OpenSSH's forwarded ssh-agent\n\nhttps://github.com/snowcra5h/CVE-2023-38408\n\n\u200b\u200bcombine\n\nRust in-memory dumper. Check your windows local security authority credential's safety with this awesome tool.\n\nhttps://github.com/m3f157O/combine_harvester\n\n\u200b\u200bTokenTactics v2\n\nA fork of the great TokenTactics with support for CAE and token endpoint v2.\n\nhttps://github.com/f-bader/TokenTacticsV2\n\n\u200b\u200bDeepCamera\n\nOpen-Source #AI #Camera. Empower any camera/CCTV with state-of-the-art AI, including facial recognition, person recognition(RE-ID) car detection, fall detection and more...\n\nhttps://github.com/SharpAI/DeepCamera\n\n\u200b\u200bAnalytics &amp; AdBlocker\n\nProtect your #privacy while browsing the web.\n\nhttps://github.com/con-schy1/Analytics_AdBlocker\n\n#cybersecurity #infosec\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-25T11:56:20.000000Z"}, {"uuid": "7ce52352-bd80-4a53-9678-83264b330ade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28467", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/851", "content": "CVE-2023-28467 : MyBB 1.8.33 User CP module - XSS\nPOC : https://github.com/ahmetaltuntas/CVE-2023-28467", "creation_timestamp": "2023-08-22T13:20:12.000000Z"}, {"uuid": "8c758c61-6a24-4534-a785-42da514cf01f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28467", "type": "seen", "source": "https://t.me/cibsecurity/64563", "content": "\u203c CVE-2023-28467 \u203c\n\nIn MyBB before 1.8.34, there is XSS in the User CP module via the user email field.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-22T22:24:53.000000Z"}, {"uuid": "d821104d-b544-43dc-a6ec-22bad79e4800", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28467", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8720", "content": "#exploit\n1. CVE-2023-32681:\nVulnerability in python-requests affects IBM InfoSphere Information Server\nhttps://github.com/hardikmodha/POC-CVE-2023-32681\n\n2. CVE-2023-28467:\nMyBB 1.8.33 - User CP email persistent XSS\nhttps://github.com/ahmetaltuntas/CVE-2023-28467\n\n3. Google Chrome V8 ArrayShift Race Condition RCE\nhttps://blog.exodusintel.com/2023/05/16/google-chrome-v8-arrayshift-race-condition-remote-code-execution", "creation_timestamp": "2023-07-23T19:34:47.000000Z"}, {"uuid": "9796cc83-bb29-4ae7-875a-d55b02ad5b99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28467", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/5341", "content": "CVE-2023-28467\n\nMyBB 1.8.33 User CP email persistent XSS\n\nGithub\n\n#CVE #XSS\n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2023-07-24T13:05:13.000000Z"}]}